# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
904160810abea5ce428f6ef7ad40e21e1111b80a63a4dbfbb53a56d97c01e97f
Pseudo Output
84abed4272490f225e5cf568eacc21050336b35a52e48693c710f526a4dfd10b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2251a50891f5b66012fdb17788c8e5cd14d8dadbe5b93c5a1e41c43bdd8b420a
Commitment
469080a8dd1c9dfcef041f30e079392e9b0f2ba0ccbee800500756b9df7ef92a
Range Proof
672 bytes (Bulletproof)
Memo
42b325fc064f176b4320ddce138a471be6398f3d571c585b89377f3e034f2c413022e5cbf2de9bff09f627e416f1152628cd187df1fcc0184bbaf867c2c187b8997854c8f37a07ca8be395a3c0b04b59cc070b48da354b5d91e1d2d978f496e2718672f78c25b8d1dec705822d88e670e58ee0773dd27c42467e75682aff3525 (encrypted)
Stealth Address
3e7af2152c62202accddb0271e56fb4f7b886ac47856121eee78d3a871ddc15d
Commitment
f40f7a35a4cb1c46c54c69ccc25974cd3238f1e18dbc6cc3bfab4a754d3c825b
Range Proof
672 bytes (Bulletproof)
Memo
8fe139f52fb2f6d0db35da8f0bc3fba0ccdad68311eec17cc04b2f8c1dd469d2e11cfa588a67c033f9dd44763ef8c88a862b1deea232bb6690c28c0db0f664efbf79beaaa98815230ca912357fe4a02c616d1a94a091ae5b661fa3c2c565367faf6cb2397e816e2383b9ab6a4b13b6df77f62aabf45f7ef115bcf7b29cc82bba (encrypted)